Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (206)
  • Open Access

    ARTICLE

    Lightweight Airborne Vision Abnormal Behavior Detection Algorithm Based on Dual-Path Feature Optimization

    Baixuan Han1, Yueping Peng1,*, Zecong Ye2, Hexiang Hao1, Xuekai Zhang1, Wei Tang1, Wenchao Kang1, Qilong Li1

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-31, 2026, DOI:10.32604/cmc.2025.071071 - 09 December 2025

    Abstract Aiming at the problem of imbalance between detection accuracy and algorithm model lightweight in UAV aerial image target detection algorithm, a lightweight multi-category abnormal behavior detection algorithm based on improved YOLOv11n is designed. By integrating multi-head grouped self-attention mechanism and Partial-Conv, a two-way feature grouping fusion module (DFPF) was designed, which carried out effective channel segmentation and fusion strategies to reduce redundant calculations and memory access. C3K2 module was improved, and then unstructured pruning and feature distillation technology were used. The algorithm model is lightweight, and the feature extraction ability for airborne visual abnormal behavior… More >

  • Open Access

    ARTICLE

    Improving Person Recognition for Single-Person-in-Photos: Intimacy in Photo Collections

    Xiaoyi Duan, Tianqi Zou, Chenyang Wang, Yu Gu, Xiuying Li*

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-24, 2026, DOI:10.32604/cmc.2025.070683 - 09 December 2025

    Abstract Person recognition in photo collections is a critical yet challenging task in computer vision. Previous studies have used social relationships within photo collections to address this issue. However, these methods often fail when performing single-person-in-photos recognition in photo collections, as they cannot rely on social connections for recognition. In this work, we discard social relationships and instead measure the relationships between photos to solve this problem. We designed a new model that includes a multi-parameter attention network for adaptively fusing visual features and a unified formula for measuring photo intimacy. This model effectively recognizes individuals More >

  • Open Access

    ARTICLE

    Detection Method for Bolt Loosening of Fan Base through Bayesian Learning with Small Dataset: A Real-World Application

    Zhongyun Tang1,2,3, Hanyi Xu2, Haiyang Hu1,3,*

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-29, 2026, DOI:10.32604/cmc.2025.070616 - 09 December 2025

    Abstract With the deep integration of smart manufacturing and IoT technologies, higher demands are placed on the intelligence and real-time performance of industrial equipment fault detection. For industrial fans, base bolt loosening faults are difficult to identify through conventional spectrum analysis, and the extreme scarcity of fault data leads to limited training datasets, making traditional deep learning methods inaccurate in fault identification and incapable of detecting loosening severity. This paper employs Bayesian Learning by training on a small fault dataset collected from the actual operation of axial-flow fans in a factory to obtain posterior distribution. This More >

  • Open Access

    ARTICLE

    A Transformer-Based Deep Learning Framework with Semantic Encoding and Syntax-Aware LSTM for Fake Electronic News Detection

    Hamza Murad Khan1, Shakila Basheer2, Mohammad Tabrez Quasim3, Raja`a Al-Naimi4, Vijaykumar Varadarajan5, Anwar Khan1,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-25, 2026, DOI:10.32604/cmc.2025.069327 - 10 November 2025

    Abstract With the increasing growth of online news, fake electronic news detection has become one of the most important paradigms of modern research. Traditional electronic news detection techniques are generally based on contextual understanding, sequential dependencies, and/or data imbalance. This makes distinction between genuine and fabricated news a challenging task. To address this problem, we propose a novel hybrid architecture, T5-SA-LSTM, which synergistically integrates the T5 Transformer for semantically rich contextual embedding with the Self-Attention-enhanced (SA) Long Short-Term Memory (LSTM). The LSTM is trained using the Adam optimizer, which provides faster and more stable convergence compared… More >

  • Open Access

    ARTICLE

    Graph Attention Networks for Skin Lesion Classification with CNN-Driven Node Features

    Ghadah Naif Alwakid1, Samabia Tehsin2,*, Mamoona Humayun3,*, Asad Farooq2, Ibrahim Alrashdi1, Amjad Alsirhani1

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-21, 2026, DOI:10.32604/cmc.2025.069162 - 10 November 2025

    Abstract Skin diseases affect millions worldwide. Early detection is key to preventing disfigurement, lifelong disability, or death. Dermoscopic images acquired in primary-care settings show high intra-class visual similarity and severe class imbalance, and occasional imaging artifacts can create ambiguity for state-of-the-art convolutional neural networks (CNNs). We frame skin lesion recognition as graph-based reasoning and, to ensure fair evaluation and avoid data leakage, adopt a strict lesion-level partitioning strategy. Each image is first over-segmented using SLIC (Simple Linear Iterative Clustering) to produce perceptually homogeneous superpixels. These superpixels form the nodes of a region-adjacency graph whose edges encode… More >

  • Open Access

    ARTICLE

    Advances in Machine Learning for Explainable Intrusion Detection Using Imbalance Datasets in Cybersecurity with Harris Hawks Optimization

    Amjad Rehman1,*, Tanzila Saba1, Mona M. Jamjoom2, Shaha Al-Otaibi3, Muhammad I. Khan1

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-15, 2026, DOI:10.32604/cmc.2025.068958 - 10 November 2025

    Abstract Modern intrusion detection systems (MIDS) face persistent challenges in coping with the rapid evolution of cyber threats, high-volume network traffic, and imbalanced datasets. Traditional models often lack the robustness and explainability required to detect novel and sophisticated attacks effectively. This study introduces an advanced, explainable machine learning framework for multi-class IDS using the KDD99 and IDS datasets, which reflects real-world network behavior through a blend of normal and diverse attack classes. The methodology begins with sophisticated data preprocessing, incorporating both RobustScaler and QuantileTransformer to address outliers and skewed feature distributions, ensuring standardized and model-ready inputs.… More >

  • Open Access

    ARTICLE

    A Convolutional Neural Network-Based Deep Support Vector Machine for Parkinson’s Disease Detection with Small-Scale and Imbalanced Datasets

    Kwok Tai Chui1,*, Varsha Arya1, Brij B. Gupta2,3,4,*, Miguel Torres-Ruiz5, Razaz Waheeb Attar6

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-23, 2026, DOI:10.32604/cmc.2025.068842 - 10 November 2025

    Abstract Parkinson’s disease (PD) is a debilitating neurological disorder affecting over 10 million people worldwide. PD classification models using voice signals as input are common in the literature. It is believed that using deep learning algorithms further enhances performance; nevertheless, it is challenging due to the nature of small-scale and imbalanced PD datasets. This paper proposed a convolutional neural network-based deep support vector machine (CNN-DSVM) to automate the feature extraction process using CNN and extend the conventional SVM to a DSVM for better classification performance in small-scale PD datasets. A customized kernel function reduces the impact… More >

  • Open Access

    ARTICLE

    Privacy-Preserving Gender-Based Customer Behavior Analytics in Retail Spaces Using Computer Vision

    Ginanjar Suwasono Adi1, Samsul Huda2,*, Griffani Megiyanto Rahmatullah3, Dodit Suprianto1, Dinda Qurrota Aini Al-Sefy3, Ivon Sandya Sari Putri4, Lalu Tri Wijaya Nata Kusuma5

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-23, 2026, DOI:10.32604/cmc.2025.068619 - 10 November 2025

    Abstract In the competitive retail industry of the digital era, data-driven insights into gender-specific customer behavior are essential. They support the optimization of store performance, layout design, product placement, and targeted marketing. However, existing computer vision solutions often rely on facial recognition to gather such insights, raising significant privacy and ethical concerns. To address these issues, this paper presents a privacy-preserving customer analytics system through two key strategies. First, we deploy a deep learning framework using YOLOv9s, trained on the RCA-TVGender dataset. Cameras are positioned perpendicular to observation areas to reduce facial visibility while maintaining accurate More >

  • Open Access

    ARTICLE

    A New Dataset for Network Flooding Attacks in SDN-Based IoT Environments

    Nader Karmous1, Wadii Jlassi1, Mohamed Ould-Elhassen Aoueileyine1, Imen Filali2,*, Ridha Bouallegue1

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.3, pp. 4363-4393, 2025, DOI:10.32604/cmes.2025.074178 - 23 December 2025

    Abstract This paper introduces a robust Distributed Denial-of-Service attack detection framework tailored for Software-Defined Networking based Internet of Things environments, built upon a novel, synthetic multi-vector dataset generated in a Mininet-Ryu testbed using real-time flow-based labeling. The proposed model is based on the XGBoost algorithm, optimized with Principal Component Analysis for dimensionality reduction, utilizing lightweight flow-level features extracted from OpenFlow statistics to classify attacks across critical IoT protocols including TCP, UDP, HTTP, MQTT, and CoAP. The model employs lightweight flow-level features extracted from OpenFlow statistics to ensure low computational overhead and fast processing. Performance was rigorously… More >

  • Open Access

    ARTICLE

    Enhancement of Medical Imaging Technique for Diabetic Retinopathy: Realistic Synthetic Image Generation Using GenAI

    Damodharan Palaniappan1, Tan Kuan Tak2, K. Vijayan3, Balajee Maram4, Pravin R Kshirsagar5, Naim Ahmad6,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.3, pp. 4107-4127, 2025, DOI:10.32604/cmes.2025.073387 - 23 December 2025

    Abstract A phase-aware cross-modal framework is presented that synthesizes UWF_FA from non-invasive UWF_RI for diabetic retinopathy (DR) stratification. A curated cohort of 1198 patients (2915 UWF_RI and 17,854 UWF_FA images) with strict registration quality supports training across three angiographic phases (initial, mid, final). The generator is based on a modified pix2pixHD with an added Gradient Variance Loss to better preserve microvasculature, and is evaluated using MAE, PSNR, SSIM, and MS-SSIM on held-out pairs. Quantitatively, the mid phase achieves the lowest MAE (98.76 ± 42.67), while SSIM remains high across phases. Expert review shows substantial agreement (Cohen’s More >

Displaying 1-10 on page 1 of 206. Per Page